Configure users and roles
uses the access control system integrated with the Splunk platform. The Splunk platform authorization allows you to add users, assign users to roles, and assign those roles custom capabilities to provide granular, role-based access control for your organization.
Splunk Enterprise Security relies on the admin user to run saved searches. If you plan to delete the admin user, update knowledge objects owned by that user before you do.
- For Splunk Enterprise, see Reassign one or more shared knowledge objects to a new owner in the Knowledge Manager Manual.
- For Splunk Cloud, see Reassign one or more shared knowledge objects to a new owner in the Knowledge Manager Manual.
There are scenarios where it is still possible for an authenticated user to interact with certain core resources outside the control of the ES app, which can result in a lack of auditability. Make sure that all users with access to the ES app are trusted users that should have access to your ES related data, such as notable events and investigations.
Configuring user roles
adds three roles to the default roles provided by Splunk platform. The new roles allow a Splunk administrator to assign access to specific functions in ES based on a user's access requirements. The Splunk platform administrator can assign groups of users to the roles that best fit the tasks the users will perform and manage in . There are three categories of users.
User | Description | Splunk ES role |
---|---|---|
Security Director | Seeks to understand the current security posture of the organization by reviewing primarily the Security Posture, Protection Centers, and Audit dashboards. A security director does not configure the product or manage incidents. | ess_user
|
Security Analyst | Uses the Security Posture and Incident Review dashboards and Investigations to manage and investigate security incidents. Security Analysts are also responsible for reviewing the Protection Centers and providing direction on what is a security incident. A Security Analyst must be able to edit notable events.. | ess_analyst
|
Solution Administrator | Installs and maintains Splunk platform installations and Splunk Apps. This user is responsible for configuring workflows, adding new data sources, and tuning and troubleshooting the application. | admin or sc_admin
|
Each custom role inherits from Splunk platform roles and adds capabilities specific to Splunk ES. Not all of the three roles custom to Splunk ES can be assigned to users.
Splunk ES role | Inherits from Splunk platform role | Added Splunk ES capabilities | Can be assigned to users |
---|---|---|---|
ess_user |
user | real-time search, list search head clustering | Yes. Replaces the user role for ES users.
|
ess_analyst |
user, ess_user, power | Inherits ess_user and adds the capabilities to create, edit, and own notable events and perform all transitions, edit glass tables, and create and modify investigations. |
Yes. Replaces the power role for ES users.
|
ess_admin |
user, ess_user, power, ess_analyst | Inherits ess_analyst and adds several other capabilities. |
No. You must use a Splunk platform admin role to administer an Enterprise Security installation. |
See the capabilities specific to for more details about which capabilities are assigned to which roles by default.
The Splunk platform admin
role inherits all unique ES capabilities. In a Splunk Cloud deployment, the Splunk platform admin role is named sc_admin
. Use the admin
or sc_admin
role to administer an Enterprise Security installation.
Splunk platform role | Inherits from role | Added capabilities | Accepts user assignment |
---|---|---|---|
admin |
user, ess_user, power, ess_analyst, ess_admin | All | Yes. |
sc_admin |
user, ess_user, power, ess_analyst, ess_admin | All | Yes. |
Role inheritance
All role inheritance is preconfigured in Enterprise Security. If the capabilities of any role are changed, other inheriting roles will receive the changes. For more information about roles, see the Splunk platform documentation.
- For Splunk Enterprise, see Add and edit roles in Securing Splunk Enterprise.
- For Splunk Cloud, see Manage Splunk Cloud roles in Splunk Cloud User Manual.
Add capabilities to a role
Capabilities control the level of access that roles have to various features in Splunk Enterprise Security. Use the Permissions page in Enterprise Security to review and change the capabilities assigned to a role.
- On the menu bar, select Configure > General > Permissions.
- Find the role you want to update.
- Find the ES Component you want to add.
- Select the check box for the component for the role.
- Save.
Capabilities specific to
uses custom capabilities to control access to -specific features.
Add capabilities on the permissions page in to make sure that the proper access control lists (ACLs) are updated. The permissions page makes the ACL changes for you. If you add these custom capabilities on the Splunk platform settings page, you must update the ACLs yourself.
Function in ES | Description | Capability | ess_user | ess_analyst | ess_admin |
---|---|---|---|---|---|
Create new notable events | Create ad-hoc notable events from search results. See Manually create a notable event in Splunk Enterprise Security. | edit_notable_events | X | X | |
Edit advanced search schedule settings | Edit the schedule priority and schedule window of correlation searches on Content Management. | edit_search_schedule_priority edit_search_schedule_window |
X | ||
Edit correlation searches | Edit correlation searches on Content Management. See Configure correlation searches in Splunk Enterprise Security. Users with this capability can also export content from Content Management as an app. See Export content as an app from Splunk Enterprise Security. | edit_correlationsearches schedule_search |
X | ||
Edit Distributed Configuration Management | Use distributed configuration management. See Deploy add-ons included with Splunk Enterprise Security. | edit_modinput_es_deployment_manager | X | ||
Edit ES navigation | Make changes to the Enterprise Security navigation. See Customize the menu bar in Splunk Enterprise Security. | edit_es_navigation | X | ||
Edit glass tables | Create and modify glass tables. See Create a glass table. | edit_glasstable | X | X | |
Edit identity lookup configuration | Manage the configuration of identity lookups and restrict asset and identity correlation. See Add asset and identity data to Splunk Enterprise Security and Configure asset and identity correlation in Splunk Enterprise Security. | edit_identitylookup | X | ||
Edit Incident Review | Make changes to Incident Review settings. See Customize Incident Review in Splunk Enterprise Security. | edit_log_review_settings | X | ||
Edit lookups | Make changes to lookup table files. See Create and manage lookups in Splunk Enterprise Security. | edit_lookups | X | ||
Edit notable event statuses | Make changes to the statuses available to select for notable events. See Manage notable event statuses. | edit_notable_events edit_reviewstatuses |
X | ||
Edit notable event suppressions | Create and edit notable event suppressions. See Create and manage notable event suppressions. | edit_suppressions | X | ||
Edit notable events | Make changes to notable events, such as assigning them. See Triage notable events on Incident Review in Splunk Enterprise Security. | edit_notable_events transition_reviewstatus-X_to_Y |
X | X | |
Edit per-panel filters | Create and manage per-panel filters for dashboards. See Configure per-panel filtering in Splunk Enterprise Security. | edit_per_panel_filters | X | ||
Edit threat intelligence | Change existing threat intelligence. See Change existing threat intelligence in Splunk Enterprise Security. | edit_modinput_threatlist edit_threat_intel_collections |
X | ||
Manage configurations | Make changes to the general settings or the list of editable lookups. See Configure general settings for Splunk Enterprise Security. | edit_managed_configurations | X | ||
Manage all investigations | Allow roles with this capability to manage, view, and delete all investigations. See Manage security investigations in Splunk Enterprise Security | manage_all_investigations | X | ||
Own notable events | Allows the role to be an owner of notable events. See Assign notable events. | can_own_notable_events | X | X | |
Search-driven lookups | Create lookup tables that can be populated by a search. See Create search-driven lookups in Splunk Enterprise Security. | edit_managed_configurations schedule_search |
X | ||
Use Investigations | Allow roles with this capability to create or edit an investigation. Roles can only make changes on investigations on which they are a collaborator. See Investigations in Splunk Enterprise Security. | edit_timelines | X | X | |
Credential Manager | Manage credentials for Splunk Enterprise Security and other apps. Cannot be set on the Permissions page. See Manage input credentials in Splunk Enterprise Security. | admin_all_objects | X |
Adjust the concurrent searches for a role
Splunk platform defines a limit on concurrently running searches for the user
and power
roles by default. You may want to change those concurrent searches for some roles.
- On the menu bar, select Configure > General > General Settings.
- Review the limits for roles and change them as desired.
Item | Description |
---|---|
Search Disk Quota (admin) | The maximum disk space (MB) a user with the admin role can use to store search job results. |
Search Jobs Quota (admin) | The maximum number of concurrent searches for users with the admin role. |
Search Jobs Quota (power) | The maximum number of concurrent searches for users with the power role. |
To change the limits for roles other then admin
and power
, edit the authorize.conf
file to update the default search quota. See the authorize.conf.example in the Splunk Enterprise Admin manual.
Configure the roles to search multiple indexes
The Splunk platform stores ingested data sources in multiple indexes. Distributing data into multiple indexes allows you to use role-based access control and vary retention policies for data sources. The Splunk platform configures all roles to search only the main
index by default. For more information about working with roles, see the Splunk platform documentation.
- For Splunk Enterprise, see About configuring role-based user access in the Securing Splunk Enterprise manual.
- For Splunk Cloud, see Manage Splunk Cloud users and roles in the Splunk Cloud User Manual.
To allow roles in to search additional indexes, assign the indexes that contain relevant security data to the relevant roles.
- Select Settings > Access Controls.
- Click Roles.
- Click the role name that you want to allow to search additional indexes.
- Select the desired Indexes searched by default and Indexes that this role can search. Do not include summary indexes, as this can cause a search and summary index loop.
- Save your changes.
- Repeat for additional roles as needed.
If you do not update the roles with the correct indexes, searches and other knowledge objects that rely on data from unassigned indexes will not update or display results.
For more information on the reasons for multiple indexes, see Why have multiple indexes? in Splunk Enterprise Managing Indexers and Clusters of Indexers.
Configure and deploy indexes | Configure data models for Splunk Enterprise Security |
This documentation applies to the following versions of Splunk® Enterprise Security: 4.7.0, 4.7.1, 4.7.2, 4.7.3, 4.7.4, 4.7.5, 4.7.6
Feedback submitted, thanks!